Combating False Reports for Secure Networked Control in Smart Grid via Trustiness Evaluation

Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the sensor reports with fraud ones may cause the instability of the whole power grid or even result in a large area blackout. In this paper, a trusti...

Full description

Saved in:
Bibliographic Details
Published inarXiv.org
Main Authors Li, Husheng, Lai, Lifeng, Djouadi, Seddik M
Format Paper Journal Article
LanguageEnglish
Published Ithaca Cornell University Library, arXiv.org 19.10.2010
Subjects
Online AccessGet full text
ISSN2331-8422
DOI10.48550/arxiv.1010.3956

Cover

Abstract Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the sensor reports with fraud ones may cause the instability of the whole power grid or even result in a large area blackout. In this paper, a trustiness system is introduced to the controller, who computes the trustiness of different sensors by comparing its prediction, obtained from Kalman filtering, on the system state with the reports from sensor. The trustiness mechanism is discussed and analyzed for the Linear Quadratic Regulation (LQR) controller. Numerical simulations show that the trustiness system can effectively combat the cyber attacks to smart grid.
AbstractList Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the sensor reports with fraud ones may cause the instability of the whole power grid or even result in a large area blackout. In this paper, a trustiness system is introduced to the controller, who computes the trustiness of different sensors by comparing its prediction, obtained from Kalman filtering, on the system state with the reports from sensor. The trustiness mechanism is discussed and analyzed for the Linear Quadratic Regulation (LQR) controller. Numerical simulations show that the trustiness system can effectively combat the cyber attacks to smart grid.
Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the sensor reports with fraud ones may cause the instability of the whole power grid or even result in a large area blackout. In this paper, a trustiness system is introduced to the controller, who computes the trustiness of different sensors by comparing its prediction, obtained from Kalman filtering, on the system state with the reports from sensor. The trustiness mechanism is discussed and analyzed for the Linear Quadratic Regulation (LQR) controller. Numerical simulations show that the trustiness system can effectively combat the cyber attacks to smart grid.
Author Lai, Lifeng
Djouadi, Seddik M
Li, Husheng
Author_xml – sequence: 1
  givenname: Husheng
  surname: Li
  fullname: Li, Husheng
– sequence: 2
  givenname: Lifeng
  surname: Lai
  fullname: Lai, Lifeng
– sequence: 3
  givenname: Seddik
  surname: Djouadi
  middlename: M
  fullname: Djouadi, Seddik M
BackLink https://doi.org/10.48550/arXiv.1010.3956$$DView paper in arXiv
https://doi.org/10.1109/icc.2011.5962594$$DView published paper (Access to full text may be restricted)
BookMark eNotkMFLwzAYxYMoOOfuniTguTNf0rTJUco2haHgehRKmqbSuSU1aaf-92bO04PH48d77wqdW2cNQjdA5qngnNwr_90d5kCiwSTPztCEMgaJSCm9RLMQtoQQmuWUczZBb4Xb12ro7Dteql0w-NX0zg8Bt87jjdGjN_jZDF_Of5gGF84O3u1wZ_Fmr_yAV75r8KFTuPRjiBQTAl4c1G6MSGev0UV7hM7-dYrK5aIsHpP1y-qpeFgnigMkjYCayrRuucikkRIyrWsKRDANVICumSTQ0hxYq7lpqKwFsFxoahhtVMvZFN2esH_Lq953sdtPdXygOj4QA3enQO_d52jCUG3d6G2sVFEiiMyBRPovyAdf2w
ContentType Paper
Journal Article
Copyright 2010. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
http://arxiv.org/licenses/nonexclusive-distrib/1.0
Copyright_xml – notice: 2010. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: http://arxiv.org/licenses/nonexclusive-distrib/1.0
DBID 8FE
8FG
ABJCF
ABUWG
AFKRA
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
HCIFZ
L6V
M7S
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
AKY
GOX
DOI 10.48550/arxiv.1010.3956
DatabaseName ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
ProQuest Technology Collection
ProQuest One Community College
ProQuest Central Korea
SciTech Premium Collection
ProQuest Engineering Collection
Engineering Database
Proquest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering collection
arXiv Computer Science
arXiv.org
DatabaseTitle Publicly Available Content Database
Engineering Database
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest One Academic UKI Edition
ProQuest Central Korea
Materials Science & Engineering Collection
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
Engineering Collection
DatabaseTitleList Publicly Available Content Database

Database_xml – sequence: 1
  dbid: GOX
  name: arXiv.org
  url: http://arxiv.org/find
  sourceTypes: Open Access Repository
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Physics
EISSN 2331-8422
ExternalDocumentID 1010_3956
Genre Working Paper/Pre-Print
GroupedDBID 8FE
8FG
ABJCF
ABUWG
AFKRA
ALMA_UNASSIGNED_HOLDINGS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
FRJ
HCIFZ
L6V
M7S
M~E
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
AKY
GOX
ID FETCH-LOGICAL-a511-d81b294bf5869e9916ccb21083c1281cb3901f2713fc5ed29b81378c2e32daf53
IEDL.DBID BENPR
IngestDate Tue Jul 22 21:56:08 EDT 2025
Mon Jun 30 09:39:08 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a511-d81b294bf5869e9916ccb21083c1281cb3901f2713fc5ed29b81378c2e32daf53
Notes SourceType-Working Papers-1
ObjectType-Working Paper/Pre-Print-1
content type line 50
OpenAccessLink https://www.proquest.com/docview/2080971071?pq-origsite=%requestingapplication%&accountid=15518
PQID 2080971071
PQPubID 2050157
ParticipantIDs arxiv_primary_1010_3956
proquest_journals_2080971071
PublicationCentury 2000
PublicationDate 20101019
2010-10-19
PublicationDateYYYYMMDD 2010-10-19
PublicationDate_xml – month: 10
  year: 2010
  text: 20101019
  day: 19
PublicationDecade 2010
PublicationPlace Ithaca
PublicationPlace_xml – name: Ithaca
PublicationTitle arXiv.org
PublicationYear 2010
Publisher Cornell University Library, arXiv.org
Publisher_xml – name: Cornell University Library, arXiv.org
SSID ssj0002672553
Score 1.4472094
SecondaryResourceType preprint
Snippet Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the...
Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the...
SourceID arxiv
proquest
SourceType Open Access Repository
Aggregation Database
SubjectTerms Blackout
Computer Science - Cryptography and Security
Computer Science - Systems and Control
Computer simulation
Controllers
Cybersecurity
Fraud
Kalman filters
Linear quadratic regulator
Smart grid
Stability
SummonAdditionalLinks – databaseName: arXiv.org
  dbid: GOX
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwdZ3NS8MwFMAf205eRPFrOjUHr4U1TZb0KGMfCM6DE3YQSj6hB6tsc_jn-5J0u4jQU0lyeK9Nfu8zAA9UGuZsKPvlXGRMOpap3KuMMlswrkRuo7_jeTGav7GnFV914H5fC6PWP_Uu9QfW4c6RYFUiwnehS2mwrWYvqxRsjJ242uGHYUiY8c2fjTWeFtMTOG4xjzwmvZxCxzVn8I4_n1Yhz5hMUeuOJPrdEARHEh3fjixSWrazZJySyEndkNcPVDCZrWtLdrUiy1AnEdPVyeTQrPscltPJcjzP2tsNMoWQk1nkRVoy7bkclS5QmjEa7S9ZmBDcMjo4IzxFG9Ib7iwttcwLIQ11BbXK8-ICes1n466AiCGXVgiBSwrmvZZDG8JrRSmLfIQT-3AZpVJ9pQYWIa1rWAV59WGwl1PVfrubiiJElggeIr_-d-INHMUwenjKAfS26293i6fzVt9FHf0CHRSOqQ
  priority: 102
  providerName: Cornell University
Title Combating False Reports for Secure Networked Control in Smart Grid via Trustiness Evaluation
URI https://www.proquest.com/docview/2080971071
https://arxiv.org/abs/1010.3956
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3NS8MwFA9zRfDmt9M5cvBa3JJmSQ8iOPaBsDp0wg7CSJMUenCb2xye_Nt9L-3mQRBKoS0t4eX1ff7ee4TcMGUiZ7HsVwgZRspFoW5lOmSR5ZHQsmV9vGOYtAev0eNETCok2dbCIKxyKxO9oLZzgzFycNIVtjsCjXi_-AhxahRmV7cjNHQ5WsHe-RZjeyQAkayA74OHbjJ63kVdWFvConiRr_TNvG718ivfoBML_muMc6wDf-ePbPYKp3dIgpFeuOURqbjZMdn3OE2zOiFv8P-mGqHKtAeM42hhQK8o2J7Ux84dTQpkt7O0U-DQaT6jL-_AI7S_zC3d5JqOsdTCI95pd9fv-5SMe91xZxCWAxJCDXZSaMHkZHGUZkK1Y4eGnjEpuHCKG8yPmRTjGRkDNzQzwlkWp6rFpTLMcWZ1JvgZqc7mM3dBqGwKZaWU8EkZZVmqmhYzdDxWvNWGF2vk3FNluih6YCAyrDlFetVIfUunacn-q-nvZl3-__iKHPh0PB5xnVTXy093DVp-nTbInur1G-UGwlX_aQLn4Xf3B7eKqWQ
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT8MwDLamTQhuvBkMyAGOFVuaLukBITE2Nh4TgiFxQKrSJJV2YIyN54_jv2GnHRyQuCH11Ko9OK792f5sA-xxZYSz1PYbRTIQyolANzIdcGFDEWnZsD7fcdlvdm_F2V10V4LPWS8M0SpnNtEbavtoKEeOQbqicUfoEY_GTwFtjaLq6myFhi5WK9hDP2KsaOw4dx9vGMJND3sneN77nHfag1Y3KLYMBBrBRmARt_FYpFmkmrEjtGRMinGQCg0VmUxKSYGMYyyXmchZHqeqEUpluAu51RktjUAPUBHU4FqGynG7f3X9neThTYkyCPPyqJ8ddqAn78NXipkxXI5pbXbF3_nlCrx_6yxC5UqP3WQJSm60DHOeFmqmK3CP5iLVxIxmHdRTx3K8PmUIdZlP1TvWz4nkzrJWTntnwxG7eUCVZKeToWWvQ80G1NnhCfas_T1efBUG_yGpNSiPHkduA5isR8pKKfGTUmRZquqWCoJhrMJGE1-swrqXSjLOR24QEa2ekLyqUJvJKSn-tmnyoxubfz_ehfnu4PIiuej1z7dgwTMB6IprUH6evLhtBBjP6U5xjAySf1acLxsY4T8
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Combating+False+Reports+for+Secure+Networked+Control+in+Smart+Grid+via+Trustiness+Evaluation&rft.jtitle=arXiv.org&rft.au=Li%2C+Husheng&rft.au=Lai%2C+Lifeng&rft.au=Djouadi%2C+Seddik+M&rft.date=2010-10-19&rft.pub=Cornell+University+Library%2C+arXiv.org&rft.eissn=2331-8422&rft_id=info:doi/10.48550%2Farxiv.1010.3956